Главная
Study mode:
on
1
Intro
2
Credentials
3
Bio
4
What is AIP
5
AIP windows
6
File size
7
File types
8
Licensing and costs
9
Tracking
10
Cost
11
Features
12
Detection
13
Transport Rule
14
Document Revocation
15
Demos
16
Demo
17
Classification
18
Sending an encrypted document
19
Opening an encrypted document
20
Tracking feature
21
Tracking demo
22
Tracking timeline
23
Uploading a document
24
Checking the results
25
Competitors
26
Email
27
Email padlock
28
Configure RMS
Description:
Explore phishing techniques that bypass mail protection controls using Azure Information Protection (AIP) in this 30-minute conference talk from Derbycon 2019. Learn about AIP's features, including windows, file sizes, types, licensing, costs, and tracking capabilities. Discover how to implement document classification, encryption, and revocation. Watch live demonstrations of sending and opening encrypted documents, utilizing tracking features, and uploading documents. Examine the tracking timeline and results. Compare AIP with competitors, and understand email-specific features like padlock integration and Rights Management Services (RMS) configuration.

Phishing Past Mail Protection Controls Using Azure Information Protection

Add to list